Cloud and edge, edge and edge networking system based on three-layer security tunnel technology
A security tunnel, edge technology, applied in the field of communication, can solve the problems of auditing, tracking difficulties, complex IP address management, loss of visibility, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The specific implementation manners of the present application will be further described in detail below in conjunction with the drawings and embodiments. The following examples are used to illustrate the present application, but not to limit the scope of the present application.
[0030] First, some terms involved in this application are introduced.
[0031] Cloud nodes refer to hosts / servers used in cloud computing.
[0032] Edge nodes refer to hosts / servers used in edge computing.
[0033] Internet Protocol (IP) address: Provides a unified address format that assigns a logical address to each network and each host on the Internet to shield the difference in physical addresses. It can be divided into public network address and private address. The public network address is in charge of the Internet Network Information Center (Internet NIC). These IP addresses are assigned to organizations that register and apply to the Inter NIC to access the Internet directly. P...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

